/system/bt/stack/smp/ |
D | p_256_curvepara.cc | 29 elliptic_curve_t* ec; in p_256_init_curve() local 32 ec = &curve_p256; in p_256_init_curve() 34 ec->p[7] = 0xFFFFFFFF; in p_256_init_curve() 35 ec->p[6] = 0x00000001; in p_256_init_curve() 36 ec->p[5] = 0x0; in p_256_init_curve() 37 ec->p[4] = 0x0; in p_256_init_curve() 38 ec->p[3] = 0x0; in p_256_init_curve() 39 ec->p[2] = 0xFFFFFFFF; in p_256_init_curve() 40 ec->p[1] = 0xFFFFFFFF; in p_256_init_curve() 41 ec->p[0] = 0xFFFFFFFF; in p_256_init_curve() [all …]
|
/system/update_engine/update_manager/ |
D | update_manager-inl.h | 33 EvaluationContext* ec, in EvaluatePolicy() argument 42 if (ec->is_expired()) { in EvaluatePolicy() 44 << ec->DumpContext(); in EvaluatePolicy() 45 ec->ResetExpiration(); in EvaluatePolicy() 49 ec->ResetEvaluation(); in EvaluatePolicy() 56 EvalStatus status = (policy_.get()->*policy_method)(ec, state_.get(), &error, in EvaluatePolicy() 61 << "\nEvaluation context: " << ec->DumpContext(); in EvaluatePolicy() 63 status = (default_policy_.*policy_method)(ec, state_.get(), &error, result, in EvaluatePolicy() 81 scoped_refptr<EvaluationContext> ec, in OnPolicyReadyToEvaluate() argument 89 EvalStatus status = EvaluatePolicy(ec.get(), policy_method, &result, args...); in OnPolicyReadyToEvaluate() [all …]
|
D | chromeos_policy.cc | 193 EvaluationContext* ec, State* state, string* error, in UpdateCheckAllowed() argument 207 const unsigned int* num_slots_p = ec->GetValue( in UpdateCheckAllowed() 215 const bool* device_policy_is_loaded_p = ec->GetValue( in UpdateCheckAllowed() 221 const bool* update_disabled_p = ec->GetValue( in UpdateCheckAllowed() 226 const bool* allow_kiosk_app_control_chrome_version_p = ec->GetValue( in UpdateCheckAllowed() 241 ec->GetValue(system_provider->var_kiosk_required_platform_version()); in UpdateCheckAllowed() 256 const string* target_version_prefix_p = ec->GetValue( in UpdateCheckAllowed() 263 const bool* release_channel_delegated_p = ec->GetValue( in UpdateCheckAllowed() 266 const string* release_channel_p = ec->GetValue( in UpdateCheckAllowed() 274 const UpdateRequestStatus* forced_update_requested_p = ec->GetValue( in UpdateCheckAllowed() [all …]
|
D | chromeos_policy.h | 59 EvaluationContext* ec, State* state, std::string* error, 63 EvaluationContext* ec, 70 EvaluationContext* ec, 76 EvaluationContext* ec, 82 EvaluationContext* ec, 144 EvalStatus NextUpdateCheckTime(EvaluationContext* ec, State* state, 177 EvaluationContext* ec, State* state, std::string* error, 193 EvalStatus UpdateScattering(EvaluationContext* ec, State* state,
|
D | update_manager.cc | 40 for (auto& ec : ec_repo_) in ~UpdateManager() local 41 ec->RemoveObserversAndTimeout(); in ~UpdateManager() 44 void UpdateManager::UnregisterEvalContext(EvaluationContext* ec) { in UnregisterEvalContext() argument 45 if (!ec_repo_.erase(ec)) { in UnregisterEvalContext()
|
D | default_policy.cc | 35 EvaluationContext* ec, State* state, std::string* error, in UpdateCheckAllowed() argument 45 ec->IsMonotonicTimeGreaterThan( in UpdateCheckAllowed() 57 EvaluationContext* ec, in UpdateCanStart() argument 77 EvaluationContext* ec, in UpdateDownloadAllowed() argument 86 EvaluationContext* ec, in P2PEnabled() argument 95 EvaluationContext* ec, in P2PEnabledChanged() argument
|
D | default_policy.h | 69 EvaluationContext* ec, State* state, std::string* error, 73 EvaluationContext* ec, State* state, std::string* error, 78 EvaluationContext* ec, State* state, std::string* error, 82 EvaluationContext* ec, State* state, std::string* error, 86 EvaluationContext* ec, State* state, std::string* error,
|
D | policy.h | 235 EvaluationContext* ec, State* state, std::string* error, 245 EvaluationContext* ec, 258 EvaluationContext* ec, 266 EvaluationContext* ec, State* state, std::string* error, 275 EvaluationContext* ec, State* state, std::string* error,
|
D | update_manager.h | 116 EvaluationContext* ec, 130 scoped_refptr<EvaluationContext> ec, 138 void UnregisterEvalContext(EvaluationContext* ec);
|
/system/security/keystore-engine/ |
D | android_engine.cpp | 295 void operator()(EC_KEY* ec) const { in operator ()() 296 EC_KEY_free(ec); in operator ()() 341 Unique_EC_KEY ec(EC_KEY_new_method(g_keystore_engine->engine())); in wrap_ecdsa() local 342 if (ec.get() == NULL) { in wrap_ecdsa() 346 if (!EC_KEY_set_group(ec.get(), EC_KEY_get0_group(public_ecdsa)) || in wrap_ecdsa() 347 !EC_KEY_set_public_key(ec.get(), EC_KEY_get0_public_key(public_ecdsa))) { in wrap_ecdsa() 356 if (!EC_KEY_set_ex_data(ec.get(), g_keystore_engine->ec_key_ex_index(), in wrap_ecdsa() 364 !EVP_PKEY_assign_EC_KEY(result.get(), ec.get())) { in wrap_ecdsa() 367 OWNERSHIP_TRANSFERRED(ec); in wrap_ecdsa()
|
/system/ca-certificates/google/files/ |
D | 5021a0a2.0 | 28 1d:a2:00:01:00:02:ec:b7:60:80:78:8d:b6:06 53 27:9c:e3:5c:cf:4e:81:dc:19:bb:91:90:7d:ec:e6: 73 ab:35:7c:53:3e:a6:27:f1:a1:2d:da:1a:23:9d:cc:dd:ec:3c: 76 ec:c9:d6:47:72:78:4b:10:46:14:8e:5f:0e:af:ec:c7:2f:ab: 77 10:d7:b6:f1:6e:ec:86:b2:c2:e8:0d:92:73:dc:a2:f4:0f:3a: 81 0f:2c:b6:9e:e3:15:bf:d9:36:1c:ba:25:1a:52:3d:1a:ec:22:
|
D | 85cde254.0 | 41 9c:b4:49:77:32:29:56:fd:b9:ec:8c:dd:22:fa:72: 42 dc:27:61:97:ee:f6:5a:84:ec:6e:19:b9:89:2c:dc: 46 b4:f4:a4:b0:f3:64:37:79:92:c0:ec:46:5e:7f:e1: 54 26:d4:08:04:59:d0:98:0e:0e:e6:de:fc:c3:ec:1f: 68 01:ec:b8:8a:67:7b:31:e2:67:2e:8c:95:03:26:2e:43:9d:4a: 73 38:d3:32:3e:38:81:75:96:73:fa:68:8f:b1:cb:ce:1f:c5:ec:
|
D | 02b73561.0 | 47 ad:bb:dd:e0:94:17:ec:d1:5c:d0:bf:ef:a5:95:c9: 82 ab:dc:9c:37:b8:21:14:4b:0d:71:3d:ec:83:33:6e:d1:6e:32: 83 16:ec:98:c7:16:8b:59:a6:34:ab:05:57:2d:93:f7:aa:13:cb: 88 ff:01:cd:a1:5f:0d:bc:71:bc:0e:ac:0b:1d:47:45:1d:c1:ec: 89 7c:ec:fd:29
|
D | 35105088.0 | 52 2d:64:09:dc:ce:89:9f:cc:3d:a9:ec:f6:cf:c1:dc: 55 2b:91:f8:e2:6f:d0:ec:16:20:90:09:3e:e2:e8:74: 77 7d:1c:4d:17:bc:c9:ec:43:26:d0:bf:41:5f:40:a9: 102 64:90:12:0f:73:28:2e:c5:e2:24:4e:fc:58:ec:f0:f4:45:fe: 107 43:6b:ff:e5:de:4d:66:11:51:cf:99:ae:ec:17:b6:e8:71:91: 109 a3:67:25:21:5d:e6:dd:1d:0b:2e:68:1b:3b:82:af:ec:83:67: 112 e0:25:25:01:b4:dd:1a:07:9c:77:00:3f:d0:dc:d5:ec:3d:d4:
|
D | 343eb6cb.0 | 38 00:f8:c8:bc:bd:14:50:66:13:ff:f0:d3:79:ec:23: 54 62:40:ec:1f:38:70:77:12:06:71:a7:30:18:5d:25: 82 8f:a7:53:73:c3:cb:ff:30:ec:7c:04:b8:d8:44:1f:93:5f:71: 83 09:22:b7:6e:3e:ea:1c:03:4e:9d:1a:20:61:fb:81:37:ec:5e:
|
/system/ca-certificates/files/ |
D | 85cde254.0 | 41 9c:b4:49:77:32:29:56:fd:b9:ec:8c:dd:22:fa:72: 42 dc:27:61:97:ee:f6:5a:84:ec:6e:19:b9:89:2c:dc: 46 b4:f4:a4:b0:f3:64:37:79:92:c0:ec:46:5e:7f:e1: 54 26:d4:08:04:59:d0:98:0e:0e:e6:de:fc:c3:ec:1f: 68 01:ec:b8:8a:67:7b:31:e2:67:2e:8c:95:03:26:2e:43:9d:4a: 73 38:d3:32:3e:38:81:75:96:73:fa:68:8f:b1:cb:ce:1f:c5:ec:
|
D | 12d55845.0 | 37 82:ec:c7:d3:2c:6b:30:ca:5b:ec:d9:c3:7d:c7:40: 43 65:df:b7:51:63:83:c8:e2:88:61:ea:4b:61:81:ec: 47 30:89:ff:e5:68:13:7b:54:0b:c8:d6:ae:ec:5a:9c: 48 92:1e:3d:64:b3:8c:c6:df:bf:c9:41:70:ec:16:72: 49 d5:26:ec:38:55:39:43:d0:fc:fd:18:5c:40:f1:97:
|
D | 52b525c7.0 | 50 4f:ad:47:87:6c:ec:5b:49:c1:4a:d5:bb:8f:ec:87: 51 ac:7f:82:9a:86:ec:3d:03:99:52:01:d2:35:9e:ac: 72 54:a2:b5:98:23:ec:08:77:1c:95:5d:61:d1:cb:89: 98 c3:1b:8f:fe:ec:3e:d3:ca:94:bf:76:0a:25:0d:a9:7b:02:1c: 104 6c:2f:6f:65:f9:db:3d:ec:21:ec:5e:f4:f4:8b:ca:60:65:54: 112 a3:63:66:02:80:bd:05:3a:3b:47:9c:ec:00:26:4c:f5:88:51: 114 9f:de:b3:af:67:03:b3:1f:dd:6d:5d:69:68:69:ab:5e:3a:ec:
|
D | 82223c44.0 | 58 4e:7f:f4:86:93:ec:84:d3:8e:bc:4b:bf:5c:01:4e: 61 42:67:62:5e:77:e0:a2:55:ec:b6:d9:69:17:d5:3a: 65 0a:57:99:3d:ee:21:e8:a3:f5:0c:16:dd:8b:ec:34: 68 57:73:1e:e9:94:39:04:bf:d3:de:38:de:b4:53:ec: 78 63:c7:fd:dd:91:ec:33:ee:f5:6d:b4:6e:30:68:de: 96 a2:c1:ec:1d:d6:fd:4f:b6:d6:47:d0:14:0b:ca:e6:ca:b5:7b: 107 ba:d5:ec:32:ae:c0:aa:ac:f7:d1:7a:4d:eb:d4:07:e2:48:f7:
|
D | 35105088.0 | 52 2d:64:09:dc:ce:89:9f:cc:3d:a9:ec:f6:cf:c1:dc: 55 2b:91:f8:e2:6f:d0:ec:16:20:90:09:3e:e2:e8:74: 77 7d:1c:4d:17:bc:c9:ec:43:26:d0:bf:41:5f:40:a9: 102 64:90:12:0f:73:28:2e:c5:e2:24:4e:fc:58:ec:f0:f4:45:fe: 107 43:6b:ff:e5:de:4d:66:11:51:cf:99:ae:ec:17:b6:e8:71:91: 109 a3:67:25:21:5d:e6:dd:1d:0b:2e:68:1b:3b:82:af:ec:83:67: 112 e0:25:25:01:b4:dd:1a:07:9c:77:00:3f:d0:dc:d5:ec:3d:d4:
|
D | 9dbefe7b.0 | 36 00:bc:7f:ec:57:9b:24:e0:fe:9c:ba:42:79:a9:88: 43 a1:04:97:58:79:ef:20:4a:82:6b:8c:22:bf:ec:1f: 63 a8:87:e9:ec:f8:40:67:5d:c3:c1:66:c7:40:4b:97:fc:87:13: 72 86:3e:07:16:92:e1:7b:e7:1d:ec:33:76:7e:42:2e:4a:85:f9:
|
D | a7605362.0 | 42 f0:4e:ec:dd:39:95:4e:83:06:7f:e7:49:40:c8:c5: 61 5a:ce:87:f9:16:72:15:57:4b:1d:d9:9b:e7:a2:26:30:ec:93: 71 d9:45:9c:5e:ec:42:50:63:ae:f4:5d:c4:b1:12:dc:ca:3b:a8: 72 2e:9d:14:5a:05:75:b7:ec:d7:63:e2:ba:35:b6:04:08:91:e8:
|
D | 63a2c897.0 | 48 63:31:f0:ec:24:f0:c3:a5:d2:72:7c:10:6d:f4:37: 50 dc:65:75:ec:2a:4d:5f:c1:87:f5:20:65:2b:81:a8: 59 1f:69:03:ec:ea:e2:50:f1:0c:3c:f0:ac:f3:53:2d: 68 26:6b:53:7c:89:8c:32:c2:6e:ec:3d:21:00:39:c9: 75 b4:2a:37:3b:70:8b:9b:5b:b9:2b:b7:ec:b2:51:12: 100 63:68:1e:6b:ec:c3:4d:86:b8:13:30:2f:5d:46:0d:47:43:d5:
|
D | b0ed035a.0 | 49 02:97:ec:43:33:0a:53:d2:9c:8c:8e:b7:b8:79:db: 58 3e:17:ec:61:aa:71:7c:c6:1d:a2:f7:49:e9:15:b5: 74 6c:67:92:33:1d:c0:b7:d2:ec:92:c8:be:09:bf:2c: 95 34:ec:3f:28:fe:0c:f1:57:86:4e:c9:55:f7:1c:d4:d8:a5:7d: 104 ec:d4:63:92:0b:5e:be:2f:76:6b:a3:b6:26:bc:8f:03:d8:0a: 108 8b:84:d6:9e:c2:eb:83:18:9f:6a:bb:1b:24:60:33:70:cc:ec:
|
D | 2fa87019.0 | 49 6a:7d:ec:48:7f:8d:c3:ab:aa:71:2b:53:69:41:53: 74 88:2c:fc:45:cc:18:b0:99:95:51:0e:ec:1d:b8:88:ff:87:50: 79 b4:66:91:26:5f:3c:2e:24:5f:cb:58:0f:eb:28:ec:af:11:96: 81 2c:6f:34:45:d3:26:e1:de:ec:5b:4f:27:6b:16:7c:bd:44:04:
|